Show filters
267 Total Results
Displaying 231-240 of 267
Sort by:
Attacker Value
Unknown

CVE-2009-0129

Disclosure Date: January 15, 2009 (last updated October 04, 2023)
libcrypt-openssl-dsa-perl does not properly check the return value from the OpenSSL DSA_verify and DSA_do_verify functions, which might allow remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.
0
Attacker Value
Unknown

CVE-2008-5077

Disclosure Date: January 07, 2009 (last updated October 04, 2023)
OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
0
Attacker Value
Unknown

CVE-2008-1678

Disclosure Date: July 10, 2008 (last updated October 04, 2023)
Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to cause a denial of service (memory consumption) via multiple calls, as demonstrated by initial SSL client handshakes to the Apache HTTP Server mod_ssl that specify a compression algorithm.
0
Attacker Value
Unknown

CVE-2008-0891

Disclosure Date: May 29, 2008 (last updated November 08, 2023)
Double free vulnerability in OpenSSL 0.9.8f and 0.9.8g, when the TLS server name extensions are enabled, allows remote attackers to cause a denial of service (crash) via a malformed Client Hello packet. NOTE: some of these details are obtained from third party information.
0
Attacker Value
Unknown

CVE-2008-1672

Disclosure Date: May 29, 2008 (last updated October 04, 2023)
OpenSSL 0.9.8f and 0.9.8g allows remote attackers to cause a denial of service (crash) via a TLS handshake that omits the Server Key Exchange message and uses "particular cipher suites," which triggers a NULL pointer dereference.
0
Attacker Value
Unknown

CVE-2008-0166

Disclosure Date: May 13, 2008 (last updated February 09, 2024)
OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys.
Attacker Value
Unknown

CVE-2007-5502

Disclosure Date: December 01, 2007 (last updated October 04, 2023)
The PRNG implementation for the OpenSSL FIPS Object Module 1.1.1 does not perform auto-seeding during the FIPS self-test, which generates random data that is more predictable than expected and makes it easier for attackers to bypass protection mechanisms that rely on the randomness.
0
Attacker Value
Unknown

CVE-2007-4995

Disclosure Date: October 13, 2007 (last updated October 04, 2023)
Off-by-one error in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8f allows remote attackers to execute arbitrary code via unspecified vectors.
0
Attacker Value
Unknown

CVE-2007-5135

Disclosure Date: September 27, 2007 (last updated October 04, 2023)
Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738. As of 20071012, it is unknown whether code execution is possible.
0
Attacker Value
Unknown

CVE-2007-3108

Disclosure Date: August 08, 2007 (last updated October 04, 2023)
The BN_from_montgomery function in crypto/bn/bn_mont.c in OpenSSL 0.9.8e and earlier does not properly perform Montgomery multiplication, which might allow local users to conduct a side-channel attack and retrieve RSA private keys.
0